Explain the changes to the ip stack, Computer Networking

Assignment Help:

After powering up his PC, Bob notices the PC was not able to properly connect to network devices. He obtained the following information from his workstation:

C:\>ipconfig

Windows IP Configuration

Ethernet adapter El90x1:

Connection-specific DNS Suffix....:

IP Address. . . . . . . . ..................: 169.254.55.187

Subnet Mask . . . . . . ................. : 255.255.0.0

Default Gateway . . . ................. :

He called the IT department for help (he was on hold for 5 minutes). When the IT tech support person got on the phone, Bob's PC had already begun working properly. Bob then obtained the following information from his workstation.

C:\>ipconfig

Connection-specific DNS Suffix....:

IP Address. . . . . . . . ..................: 139.100.110.50

Subnet Mask . . . . . . ................. : 255.255.0.0

Default Gateway . . . ................. : 139.100.110.1

a. Explain in detail what occurred.

b. How can Bob account for the first IP stack entries?

c. How would you explain the changes to the IP stack?


Related Discussions:- Explain the changes to the ip stack

Determine about unique least-cost path, Determine about unique least-cost p...

Determine about unique least-cost path If there is a unique least-cost path, the two algorithms will yield the similar result because they are both guaranteed to search the lea

Explain the bit-level encryption, Q. Explain the Bit-Level Encryption? ...

Q. Explain the Bit-Level Encryption? Bit-Level Encryption - Data is divided into blocks of bits then altered by encoding/decoding, permutation, substitution, exclusive OR

Describe the dsdm life-cycle with a suitable diagram, Question : (a) De...

Question : (a) Describe how ‘prototyping' is important to RAD. (b) List main features of ‘prototyping'. (c) List main principles of DSDM. (d) Describe the DSDM life-

Introduction to operations research, explain the three classification of op...

explain the three classification of operation research

Ppp authentication chap pap secret, As the system administrator, you type "...

As the system administrator, you type "ppp authentication chap pap secret". Name the authentication method is used first in setting up a session? Ans)  the authentication method

Coaxial applications and performance, Coaxial Applications & Performance ...

Coaxial Applications & Performance - Analog plus digital phone networks - Cable TV networks - Traditional Ethernet LANs - Power line and Home Networks-phone line -

Discuss about the jpeg and ldap, Discuss  about the JPEG and LDAP J...

Discuss  about the JPEG and LDAP JPEG: Stands for Joint Photographic Experts Group.  A standard format of storing digitized, colour, or black-and-white photographs. JPEG fi

Labels and label switching, An ATM network is created from interconnected A...

An ATM network is created from interconnected ATM switches. The attachment ports or points can be connected to computers or other ATM switches. As cells reach at an ATM switch, the

Explain simple mail transfer protocol, Q. Explain Simple Mail Transfer Prot...

Q. Explain Simple Mail Transfer Protocol? Electronic Mail -Simple Mail Transfer Protocol (SMTP) is used to support email on the Internet -Addressing consists of two pa

network consultant, Network Consultant, My name is Jason Long. I am th...

Network Consultant, My name is Jason Long. I am the CEO of IL Corporation. IL is an investment firm that performs financial services to many organizations. We currently have a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd